Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack
暂无分享,去创建一个
[1] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[2] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[3] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[4] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[5] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[6] C. F. Chong,et al. IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..
[7] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[8] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[9] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[10] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[11] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[12] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[13] Christopher Leckie,et al. An efficient filter for denial-of-service bandwidth attacks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[14] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[15] Vijay Varadharajan,et al. Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..
[16] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[17] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[18] Jun Xu,et al. IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks , 2003, IEEE Trans. Parallel Distributed Syst..
[19] Jonathan Lemon,et al. Resisting SYN Flood DoS Attacks with a SYN Cache , 2002, BSDCon.